Open-Source Intelligence (OSINT): A Powerful Tool for Information Gathering 2024–2025
Open-source intelligence (OSINT) is an essential tool for cyber security professionals. It involves … ⌘ Read more
Top Websites to Learn Hacking and Compete in Capture the Flag (CTF)
Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing my journey from a…
[Continue rea … ⌘ Read more
A Simple yet Powerful Elastic SIEM Lab Project
In this guide, I’ll walk you through setting up a home lab for Elastic Stack Security Information and Event Management (SIEM) using the…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/a … ⌘ Read more
How to Set Up Your Hacking Machine — Complete Beginner Edition
Well hello there , Hi i m Satyam , a cybersecurity passionate and content writer .. I love writing about Tech, Cybersecurity and framing…
[Continue reading on Info … ⌘ Read more
Windows Processes Exploited: Uncovering Hacker Tactics for Persistence
A Dive into How Attackers Manipulate Common Windows Processes to Evade Detection and Maintain Control
[Continue reading on InfoSec Write-u … ⌘ Read more
YARA Rules: Empower Your Security With Custom Detections
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them.
[Continue reading on InfoSec Write-ups »](https://infosecwri … ⌘ Read more
Google Safe Browsing Blacklisting Due to Website Compromise
When a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…
[Continue reading on InfoSec Write … ⌘ Read more
Essential Windows Network Commands Every SOC Analyst Must Know
Mastering these commands will empower you to effectively investigate and respond to network security incidents
[Continue reading on InfoSec Write-ups »](https:/ … ⌘ Read more
Mastering Reconnaissance with Nmap: Unveiling Your Target’s Secrets
Nmap (Network Mapper) is one of the most powerful and widely-used open-source tools for network discovery and security auditing. It’s a…
[Continue rea … ⌘ Read more
How to Actually Learn Hacking in 2024–25 : A Practical Guide
Author- Satyam Pathania
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-actually-learn-hacking-in-2024-25-a-practical-guide-faaca1dda42b?source=rss- … ⌘ Read more
Unauthorized Deletion of Forms by Low-Level Unlicensed Users: A 500$ Access Control Bug
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/unauthorized-deleti … ⌘ Read more
What is WAF? & Secret Techniques to Bypass It
WAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/what-is-waf … ⌘ Read more
Here’s Why I Don’t Suggest People to Get into Cybersecurity
What Most Won’t Tell You About a Career in Cybersecurity
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/heres-why-i-don-t-suggest-people-to-get-into … ⌘ Read more